Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
matrix algebra
biblio
Information Network Risk Assessment Based on AHP and Neural Network
Submitted by grigby1 on Fri, 05/08/2020 - 2:54pm
Metrics
Neural Network Security
system risk value
security risk assessment
risk judgment matrix consistency
neural network technology
neural network
information network security risk assessment application
information network risk assessment
automatic assessment
asset risk value
analytic hierarchy process
AHP method
AHP
information network
risk analysis
security of data
neural nets
information networks
Communication networks
Object recognition
matrix algebra
Resiliency
resilience
policy-based governance
pubcrawl
Neural networks
security
risk management
collaboration
Training
biblio
A Multiple Layer Security Scheme Utilizing Information Matrices
Submitted by aekwall on Mon, 03/30/2020 - 11:40am
secret data
word length 256 bit
secret message
multiple layer security scheme
least significant bit embedding
information matrix
information matrices
double-layer message security scheme
Steganography
Cryptography
AES algorithm
QR codes
cyber physical systems
matrix algebra
pubcrawl
Resiliency
telecommunication security
biblio
Information Theoretical Secure Key Sharing Protocol for Noiseless Public Constant Parameter Channels without Cryptographic Assumptions
Submitted by grigby1 on Wed, 03/04/2020 - 4:13pm
matrix algebra
theoretical cryptography
SNR
Signal to noise ratio
Shannon information
Quantization (signal)
pubcrawl
Protocols
protocol restrictions
private key cryptography
privacy amplification procedure
Privacy Amplification
privacy
physical layer security
noiseless public constant parameter channels
artificial noise
key sharing protocol
internet
information theoretical secure key sharing protocol
Eigenvalues and eigenfunctions
eigenvalues
eavesdropper channels
Cryptography
Cryptographic Protocols
cryptographic assumptions
constant parameter noiseless public channel
computer network security
Compositionality
composability
Bit error rate
biblio
A Low-Rank Framework of PMU Data Recovery and Event Identification
Submitted by grigby1 on Mon, 03/02/2020 - 1:35pm
phasor measurement
Vectors
System recovery
synchrophasor measurements
Synchrophasor data
security of data
Resiliency
resilience
real-time event identification method
pubcrawl
privacy-preserving data
power system situational awareness
power engineering computing
PMU data recovery
PMU channels
cyber data attacks
matrix algebra
low-rank matrices
low-rank framework
high-dimensional spatial-temporal blocks
ground-truth data
false data injection attacks
event identification methods
error correction
disturbance identification
data recovery method
data quality
data privacy enhancement
data privacy
data matrix
biblio
An Optimal Design of a Moving Target Defense for Attack Detection in Control Systems
Submitted by grigby1 on Tue, 02/18/2020 - 12:06pm
optimisation
time-varying systems
time-varying system matrices
time-varying dynamics
system parameters
system estimation performance
sensors
Scalability
Resiliency
resilience
pubcrawl
actuators
optimal design
moving target defense
Metrics
matrix algebra
integrity attacks
control system security
control systems
Attack detection
adaptive attack strategy
biblio
Exact Sparse Signal Recovery via Orthogonal Matching Pursuit with Prior Information
Submitted by aekwall on Mon, 02/17/2020 - 2:23pm
exact recovery probability
Upper bound
sensing matrix
random matrix
prior information
prior distribution information
orthogonal matching Pursuit algorithm
orthogonal matching pursuit (OMP)
OMP
nonzero entries
Matching pursuit algorithms
linear model
K-sparse signals
greedy algorithms
exact sparse signal recovery
Resiliency
compressed sensing
Closed-form solutions
sensors
signal processing security
gaussian distribution
Indexes
probability
privacy
computer security
Metrics
matrix algebra
Iterative methods
composability
pubcrawl
biblio
On Cryptographic Properties of Some Lightweight Algorithms and its Application to the Construction of S-Boxes
Submitted by aekwall on Mon, 01/20/2020 - 11:59am
Resiliency
MIDORI
minimal nonlinearity degree
mixing matrix
modified additive generator
nonlinear properties
optimization
output block
pubcrawl
maximal linear characteristic
S-box
S-boxes
Scalability
SKINNY
storage huge substitution tables
the degree of nonlinearity
the exponent of a matrix
upper bounds
Generators
algorithmic realization
Ciphers
CLEFIA
coordinate functions
cryptographic properties
Cryptography
encryption
exact values
Additives
index of perfection
index of strong nonlinearity
lightweight block ciphers
lightweight cipher SPECK
Lightweight Ciphers
lightweight cryptography
matrix algebra
maximal differential characteristic
biblio
Compressive Sensing and Hyper-Chaos Based Image Compression-Encryption
Submitted by grigby1 on Tue, 12/10/2019 - 11:21am
Hyper-chaos
Two dimensional displays
Sparse matrices
sparse coefficients
security
Resiliency
resilience
pubcrawl
privacy
matrix algebra
Logistics
linear measurements
Image reconstruction
Image coding
hyper-chaos based image compression-encryption algorithm
hyper-chaos based diffusion
2D-Compressive Sensing
encryption
data compression
cyber physical systems
Cyber Physical System
Cryptography
compressive sensing
compressive sampling
compression-encryption algorithm
Compression
compressed sensing
composability
cipher image
chaotic communication
chaos based measurement matrix construction
chaos
biblio
An Efficient Privacy-Preserving Algorithm Based on Randomized Response in IoT-Based Smart Grid
Submitted by aekwall on Mon, 06/24/2019 - 3:05pm
policy-based governance
Utility-privacy tradeoff
Sparse Coding
smart power grids
smart grid consumer privacy
Smart Grid Consumeer Privacy
Smart Grid
response noise
Resiliency
randomized response algorithm
Randomized Response
pubcrawl
privacy-preserving algorithm
power engineering computing
behavior characteristics
Metrics
matrix algebra
IoT-based smart grid
IoT
Internet of Things
Human behavior
energy consumption data
differential-privacy
differential privacy
data privacy
consumer behaviors
behavior signatures matrix
behavior signature modeling method
biblio
Pseudo-Random Beamforming with Beam Selection for Improving Physical-Layer Security
Submitted by aekwall on Mon, 03/25/2019 - 9:58am
optimal beamforming matrix
Downlink
downlink cellular network
eavesdroppers
Interference
legitimate mobile stations
multiple beam forming matrices
novel pseudorandom beamforming technique
opportunistic feedback
opportunistic scheduling
cellular radio
orthogonal beamforming vectors
radio links
Random beamforming
received signal-to-interference-and-noise ratio value
received SINR value
secrecy rate
secrecy sum-rate maximization
signal processing security
Signal to noise ratio
security
Resiliency
pubcrawl
composability
Wireless communication
matrix algebra
Metrics
Vectors
telecommunication security
physical-layer security
antenna arrays
antennas
array signal processing
base station
beam selection
BS
Cellular networks
« first
‹ previous
1
2
3
4
5
6
next ›
last »